Caught Off Guard

FPS is slow in applying technology to protect government buildings.

The Federal Protective Service has made visible but limited progress in improving its risk management program-which addresses threats to agency buildings-and in the transfer of its programs to new authorities within the Homeland Security Department. At least that's the view of a pair of recent Government Accountability Office reports.

The troubled FPS, whose primarily contractor workforce is responsible for the safety of more than 1 million federal employees and members of the public who work in and visit more than 9,000 federal facilities, has struggled to integrate a new Web-based risk assessment management program called RAMP to help it set priorities in managing guards. The agency also is in the throes of transitioning from the Immigration and Customs Enforcement bureau to the National Protection and Programs Directorate.

In March, the agency was embarrassed when an undetected improvised explosive device was discovered near the McNamara Federal Building in Detroit. In July, FPS Director L. Eric Patterson told a House subcommittee that his agency's four-year effort to develop a long-recommended centralized tool for prioritizing threats to federal buildings "was not cost-effective and has not fulfilled its original goals." FPS decided to switch contractors.

In a report on the risk assessment system, GAO said, RAMP is "over budget, behind schedule, and cannot be used to complete [facility security assessments] and reliable guard inspections as intended. RAMP's contract award amount totals $57 million, almost three times more than the $21 million original development contract amount."

The report noted, "RAMP's costs increased, in part because FPS changed the original system requirements and the contractor had to add additional resources to accommodate the changes. FPS also has experienced delays in developing and implementing RAMP, as it is almost two years behind its original July 2009 implementation date."

GAO reviewed RAMP's progress against DHS' security standards such as the National Infrastructure Protection Plan and the Interagency Security Committee's Physical Security Criteria for Federal Facilities. It concluded that FPS had not sufficiently evaluated technological changes since the contract for RAMP was awarded and has not adequately considered alternative systems.

To accelerate the process of making RAMP usable, GAO recommends that FPS take the following steps

  • Evaluate whether it is cost-effective to finish developing RAMP, and increase project management best practices by managing requirements and conducting user acceptance testing.
  • Establish a process for verifying data on federal facilities and guard training and certification before entering them into RAMP.
  • Develop interim solutions for facility and guard inspections while addressing RAMP's problems.

Steve Amitay, legislative counsel for the National Association of Security Companies, many of whose members are under contract with FPS, said in an email to Government Executive, "Effective FPS management and tracking of guard records will benefit FPS, its client agencies and security contractors.

FPS security contractors have considerable expertise and working experience in the management and tracking of officer training and certification records, and contractors play a critical role in supplying and maintaining FPS guard records."

But security contractors were not consulted during the development of RAMP, Amitay added, "and some of problems with RAMP noted by the GAO were apparent to security contractors from the beginning. As the agency goes forward in its post-RAMP efforts to develop an effective interactive database for tracking officer records, it behooves FPS to consult and work with its security contractor partners."

David Wright, president of the American Federation of Government Employees' National Federal Protective Service local, which has long been vocal about RAMP's shortcomings, says he would support an investigation into criminal behavior or misconduct.

"I find it disturbing-although not surprising-that the GAO uncovered that the contract acquisitions process was not followed at all levels," he notes. "At the very least, this constitutes nonfeasance of duties, if not malfeasance." Wright is optimistic about the next version of RAMP, particularly since his union and workers have been involved. "I am concerned with the staying power of individuals in the FPS hierarchy that allowed this debacle to occur in the first place," he says.

In a separate report on the transfer of Federal Protective Services out of ICE, GAO said that "since October 2009, FPS' facility protection mission and 13 of 18 mission-support functions have transferred from ICE to NPPD; however, the transition schedule for the five remaining mission-support functions has been delayed." Functions that have been transferred include human capital and budget formulation. Those that have not include information technology services, business continuity and emergency preparedness, facilities, personnel security and equal employment opportunity.

GAO has recommended a more disciplined schedule for the transition, particularly in IT services, and DHS officials agreed. "If not properly planned and effectively implemented," the auditors said, "the transition could not only hamper FPS' ability to carry out its mission, but impede its progress in addressing its long-standing challenges."

The union told Congress in 2009 that failure to provide enough money-and to transfer money from ICE to NPPD-would make for a slow and inefficient transition, according to Wright. "Our warnings were obviously not heeded, and the GAO has spelled out the consequences," he says. "As an example, the reliance on the ICE computer network and IT staff has directly contributed to the failure of RAMP."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.


When you download a report, your information may be shared with the underwriters of that document.